000 | 04148nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-030-41702-4 | ||
003 | DE-He213 | ||
005 | 20240730164522.0 | ||
007 | cr nn 008mamaa | ||
008 | 200222s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030417024 _9978-3-030-41702-4 |
||
024 | 7 |
_a10.1007/978-3-030-41702-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security Theory and Practice _h[electronic resource] : _b13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings / _cedited by Maryline Laurent, Thanassis Giannetsos. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aX, 253 p. 91 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12024 |
|
505 | 0 | _aInvited Paper -- How to Compartment Secrets - Trust Everybody, but Cut the Cards (Invited Talk) -- Authentication -- A Lattice-based Enhanced Privacy ID -- A Generic View on the Unified Zero-Knowledge Protocol and its Applications -- Cryptography -- Verifiable and Private Oblivious Polynomial Evaluation -- Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations - With an Illustration on AES -- Strong Designated Verifier Signature Based on the Rank Metric -- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things -- Threats -- Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture -- Threat Analysis of Poisoning Attack against Ethereum Blockchain -- A Template-based Method for the Generation of Attack Trees (short paper) -- Cybersecurity -- Analysis of QUIC Session Establishment and its Implementations -- CompactFlow: A Hybrid Binary Format for Network Flow Data -- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities -- Internet of Things -- Automated Security Analysis of IoT Software Updates -- Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper). | |
520 | _aThis volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aApplication software. _984958 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aComputer Communication Networks. _984960 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _984963 |
700 | 1 |
_aLaurent, Maryline. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _984965 |
|
700 | 1 |
_aGiannetsos, Thanassis. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _984966 |
|
710 | 2 |
_aSpringerLink (Online service) _984968 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030417017 |
776 | 0 | 8 |
_iPrinted edition: _z9783030417031 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12024 _984969 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-41702-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c85749 _d85749 |